1. What is the full form of “AI”?
a) Artificially Intelligent
b) Artificial Intelligence
c) Artificially Intelligence
d) Advanced Intelligence
2. Who is the inventor of Artificial Intelligence?
a) Geoffrey Hinton
b) Andrew Ng
c) John McCarthy
d) Jürgen Schmidhuber
3. What is an operating system?
a) interface between the hardware and application programs
b) collection of programs that manages hardware resources
c) system service provider to the application programs
d) all of the mentioned
4. What is the full form of OSI?
a) optical service implementation
b) open service Internet
c) open system interconnection
d) operating system interface
5. What is the main function of the command interpreter?
a) to provide the interface between the API and application program
b) to handle the files in the operating system
c) to get and execute the next user-specified command
d) none of the mentioned
6. To access the services of the operating system, the interface is provided
by the ___________
a) Library
b) System calls
c) Assembly iCssnstructions
d) API
7. The main memory accommodates ____________
a) cpu
b) user processes
c) operating system
d) all of the mentioned
8. Which type of data can be stored in the database?
a) Image oriented data
b) Text, files containing data
c) Data in the form of audio or video
d) All of the above
9. What data structure would you mostly likely see in non recursive
implementation of a recursive algorithm?
a) Stack
b) Linked List
c) Tree
d) Queue
10. Which data structure is based on the Last In First Out (LIFO)
principle?
a) Tree
b) Linked List
c) Stack
d) Queue
11. A programmer, writes a program to multiply two numbers instead
of dividing them by mistake, how can this error be detected?
a) Compiler or interpreter
b) Compiler only
c) Interpreter only
d) None of the mentioned
12. Which HTML tag is used to create a hyperlink?
a) <link>
b) <href>
c) <a>
d) <hyperlink>
13. Switches connected in parallel represent which operation?
a) NOT
b) AND
c) OR
d) NAND
14. What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned
15. Which of the following is a type of cyber attack?
a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above
16. Which of the following is a type of architecture used in the
computers nowadays?
a) Microarchitecture
b) Harvard Architecture
c) Von-Neumann Architecture
d) System Design
17. To reduce the memory access time we generally make use of ______
a) SDRAM’s
b) Heaps
c) Cache’s
d) Higher capacity RAM’s
18. If the instruction Add R1, R2, R3 is executed in a system which is
pipelined, then the value of S is (Where S is term of the Basic performance
equation).
a) 2
b) ~1
c) ~7
d) 2
19. What is a computer network?
a) A device used to display information on a computer screen
b) A collection of interconnected computers and devices that can
communicate and share resources
c) A type of software used to create documents and presentations
d) The physical casing that protects a computer’s internal components
20. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6